default search action
Sayandeep Saha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Rajat Sadhukhan, Sayandeep Saha, Sudipta Paria, Swarup Bhunia, Debdeep Mukhopadhyay:
VALIANT: An EDA Flow for Side-Channel Leakage Evaluation and Tailored Protection. IEEE Trans. Computers 73(2): 436-450 (2024) - [j12]Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 844-869 (2024) - [j11]Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 690-736 (2024) - [j10]Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 19: 514-528 (2024) - [c22]Swathi Kumar Vembu, Anupam Chattopadhyay, Sayandeep Saha:
Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management. VLSID 2024: 318-323 - [i21]Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. CoRR abs/2401.14098 (2024) - [i20]Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. IACR Cryptol. ePrint Arch. 2024: 147 (2024) - [i19]Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin:
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives. IACR Cryptol. ePrint Arch. 2024: 484 (2024) - 2023
- [j9]Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning. J. Cryptol. 36(3): 19 (2023) - [c21]Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. CCS 2023: 990-1004 - [c20]Hao Guo, Sayandeep Saha, Vasudev Gohil, Satwik Patnaik, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran:
ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning. DAC 2023: 1-6 - [c19]Sayandeep Saha, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin:
Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP. DATE 2023: 1-6 - [c18]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches. HPCA 2023: 233-246 - [i18]Adrien Benamira, Tristan Guérand, Thomas Peyrin, Sayandeep Saha:
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture. CoRR abs/2302.01584 (2023) - [i17]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
A short note on the paper 'Are Randomized Caches Really Random?'. CoRR abs/2304.00955 (2023) - [i16]Anirban Chakraborty, Nimish Mishra, Sayandeep Saha, Sarani Bhattacharya, Debdeep Mukhopadhyay:
On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures. CoRR abs/2310.05172 (2023) - [i15]Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. IACR Cryptol. ePrint Arch. 2023: 1341 (2023) - [i14]Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. IACR Cryptol. ePrint Arch. 2023: 1674 (2023) - 2022
- [j8]Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu:
NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models. ACM J. Emerg. Technol. Comput. Syst. 18(3): 51:1-51:19 (2022) - [j7]Soumik Sinha, Sayandeep Saha, Manaar Alam, Varun Agarwal, Ayantika Chatterjee, Anoop Mishra, Deepak Khazanchi, Debdeep Mukhopadhyay:
Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4004-4015 (2022) - [j6]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Trans. Symmetric Cryptol. 2022(4): 291-324 (2022) - [c17]Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay:
TransNet: Shift Invariant Transformer Network for Side Channel Analysis. AFRICACRYPT 2022: 371-396 - [c16]Rajat Sadhukhan, Sayandeep Saha, Debdeep Mukhopadhyay:
AntiSIFA-CAD: A Framework to Thwart SIFA at the Layout Level. ICCAD 2022: 63:1-63:9 - [c15]Arshdeep Kaur, Sayandeep Saha, Chandan Karfa, Debdeep Mukhopadhyay:
Corruption Exposes You: Statistical Key Recovery from Compound Logic Locking. ISQED 2022: 1-6 - [i13]Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay:
PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement. IACR Cryptol. ePrint Arch. 2022: 1005 (2022) - [i12]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2022: 1055 (2022) - [i11]Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran:
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning. IACR Cryptol. ePrint Arch. 2022: 1468 (2022) - 2021
- [c14]Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin:
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks. ASIACRYPT (2) 2021: 62-94 - [c13]Sayandeep Saha, Debdeep Mukhopadhyay:
Transform Without Encode is not Sufficient for SIFA and FTA Security: A Case Study. COSADE 2021: 85-104 - [c12]Rajat Sadhukhan, Sayandeep Saha, Debdeep Mukhopadhyay:
Shortest Path to Secured Hardware: Domain Oriented Masking with High-Level-Synthesis. DAC 2021: 223-228 - [i10]Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay:
TransNet: Shift Invariant Transformer Network for Power Attack. IACR Cryptol. ePrint Arch. 2021: 827 (2021) - 2020
- [j5]Navid Vafaei, Sayandeep Saha, Nasour Bagheri, Debdeep Mukhopadhyay:
Fault Attack on SKINNY Cipher. J. Hardw. Syst. Secur. 4(4): 277-296 (2020) - [j4]Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. IEEE Trans. Inf. Forensics Secur. 15: 1905-1919 (2020) - [c11]Akashdeep Saha, Sayandeep Saha, Siddhartha Chowdhury, Debdeep Mukhopadhyay, Bhargab B. Bhattacharya:
LoPher: SAT-Hardened Logic Embedding on Block Ciphers. DAC 2020: 1-6 - [c10]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers. DATE 2020: 1303-1306 - [c9]Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation. EUROCRYPT (1) 2020: 612-643 - [i9]Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu:
Deep-Lock: Secure Authorization for Deep Neural Networks. CoRR abs/2008.05966 (2020) - [i8]Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Leakage Assessment in Fault Attacks: A Deep Learning Perspective. IACR Cryptol. ePrint Arch. 2020: 306 (2020) - [i7]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory. IACR Cryptol. ePrint Arch. 2020: 380 (2020) - [i6]Sayandeep Saha, Arnab Bag, Debdeep Mukhopadhyay:
Pushing the Limits of Fault Template Attacks: The Role of Side-Channels. IACR Cryptol. ePrint Arch. 2020: 892 (2020)
2010 – 2019
- 2019
- [j3]Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
An automated framework for exploitable fault identification in block ciphers. J. Cryptogr. Eng. 9(3): 203-219 (2019) - [j2]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IEEE Trans. Inf. Forensics Secur. 14(4): 954-968 (2019) - [c8]Sayandeep Saha, S. Nishok Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay, Pallab Dasgupta:
ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures. DAC 2019: 136 - [i5]Sayandeep Saha, Debapriya Basu Roy, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 937 (2019) - 2018
- [j1]Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 242-276 (2018) - [c7]Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, Pallab Dasgupta:
Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel. FDTC 2018: 15-22 - [c6]Navid Vafaei, Nasour Bagheri, Sayandeep Saha, Debdeep Mukhopadhyay:
Differential Fault Attack on SKINNY Block Cipher. SPACE 2018: 177-197 - [i4]Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 295 (2018) - 2017
- [c5]Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining Approach. PROOFS 2017: 50-67 - [i3]Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
Differential Fault Analysis Automation. IACR Cryptol. ePrint Arch. 2017: 673 (2017) - [i2]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IACR Cryptol. ePrint Arch. 2017: 1008 (2017) - 2016
- [c4]Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Testability Based Metric for Hardware Trojan Vulnerability Assessment. DSD 2016: 503-510 - 2015
- [c3]Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. CHES 2015: 577-596 - [i1]Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability. IACR Cryptol. ePrint Arch. 2015: 1252 (2015) - 2014
- [c2]Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören:
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. WESS 2014: 1:1-1:8 - [c1]Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor:
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. HOST 2014: 50-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint